How Sudden Censorship Can Increase Access to Information∗

Total Page:16

File Type:pdf, Size:1020Kb

Load more

How Sudden Censorship Can Increase Access to Information∗ William Hobbsyand Margaret E. Robertsz October 23, 2016 Abstract Conventional wisdom assumes that increased censorship will strictly decrease access to information. We delineate circumstances when increases in censorship will expand access to information. When governments suddenly impose censorship on previously uncensored information, citizens accustomed to acquiring this information will be incentivized to learn methods of censorship evasion. These tools provide continued access to the newly blocked information and also extend users' ability to access information that has long been censored. We illustrate this phenomenon using millions of individual-level actions of social media users in China before and after the block of Instagram. We show that the block inspired millions of Chinese users to acquire virtual private networks (VPNs) and join censored websites like Twitter and Facebook. Despite initially being apolitical, these new users began browsing blocked political pages on Wikipedia, following Chinese political activists on Twitter, and discussing highly politicized topics such as opposition protests in Hong Kong. ∗We thank the following people for helpful comments and suggestions on this work: Alexei Abrahams, Eli Berman, Allen Carlson, Dean Eckles, James Fowler, Navid Hassanpour, Ruixue Jia, Holger Kern, Gary King, Shuhei Kurizaki, Jennifer Pan, Maria Petrova, Susan Shirk, Zachary Steinert-Threlkeld, Brian Tsay, Yiqing Xu, Jason Wu, the participants in the Social Media and Political Participation Global Conference and the Pacific Peace Science Conference. We specifically thank Zachary Steinert-Threlkeld for graciously supplying geo-located Twitter data from China and Pablo Barber´awho helped us access geo-located Instagram data. We thank joint funding from the Policy Design and Evaluation Lab and Center for Global Transformation at UC San Diego and the Hellman Fellows Fund. yDepartment of Political Science, University of California, San Diego, Social Sciences Building 301, 9500 Gilman Drive, #0521, La Jolla, CA 92093-0521, http://polisci2.ucsd.edu/whobbs/ zAssistant Professor, Department of Political Science, University of California, San Diego, Social Sciences Building 301, 9500 Gilman Drive, #0521, La Jolla, CA 92093-0521, [email protected], MargaretRoberts.net 1 Introduction Scholars have studied censorship by assuming it has an exogenous impact on a passive citizenry. Conventional wisdom posits that censorship should lower the probability that citizens access information (Morozov, 2012; Lessig, 1999). Not surprisingly, then, authoritarian governments appear to be tightening their grip on information environments, increasing their use of search filtering, content removal, and website blocking (Deibert et al., 2010; Kelly et al., 2012; Shirk, 2011), along with rapid online censorship during large-scale collective action events (King, Pan and Roberts, 2013, 2014), Here, we show that information environments more realistically function like ecosystems and are therefore not always predictable. Because citizens quickly adapt to censorship, the imposition of Internet restrictions can sometimes have unexpected consequences. In certain circumstances, sudden censorship can even result in the opposite of the intended effect: an increase in access to off-limits information. We show that censorship can increase access to information when a government extends censorship to previously uncensored media, especially when individuals have no ready alterna- tives to replace it. When favorite and difficult to replace media are suddenly blocked, those who would otherwise not take the time to evade censorship restrictions will have a stronger motive to learn how to continue to access the newly censored information. Because censorship evading technology (and, more broadly, social networks) that assist in evasion are rarely specific to par- ticular information sources, acquisition of these tools and networks can give users unhindered access to many country-specific blocked sources. Although many users might learn censorship evasion only to maintain access to a preferred source, censorship evasion incidentally expands the set of information these users can easily access. We name this phenomenon a \gateway ef- fect" as the motivation to access the newly censored information provides a gateway into access to information that has long been censored or blocked. We illustrate this phenomenon by bringing to bear one of the first large, detailed, and individual-level datasets of the real-time censorship evasion behavior of Internet users under policies of increased censorship. Using geo-located social media data from websites that are blocked by the Great Firewall in China, we measure the number and types of people who use Virtual Private Networks (VPNs) to \jump" the Great Firewall to access information and networks blocked by the Chinese government. We show how increases in censorship through blocking of the popular social networking website Instagram in China disrupted the habits of millions of individuals accustomed to visiting that site and increased evasion of the Great Firewall. In doing so, censorship of Instagram created a sudden increase in the number of people from China accessing websites and networks such as Twitter and Facebook that the Chinese government has blocked for many years. We present evidence that previously apathetic Chinese social media users began to engage in topics related to ongoing protest events and with people in Chinese activist circles shortly after the Instagram block. Our evidence suggests a mechanism that could explain previous work that has found a 2 positive correlation between censorship and the likelihood of government resistance (Hassanpour, 2014; Nabi, 2014). However, importantly, the \gateway effect” we explore does not rely on backlash against censorship which has commonly explained this phenomenon in the past. Our mechanism also does not require pre-existing or nascent political interest on the part of the censored individuals. As governments expand the types of information that are off limits, they can simply create more incentives for individuals to engage in networks and technologies that allow them to access the media they are accustomed to consuming, and these technologies in turn allow them to access to information they did not have access to before. We want to be clear that our findings do not suggest that censorship is ineffective in general or that increases in censorship will always backfire against governments. Our evidence suggests that through the gateway effect, there are circumstances where censorship can increase access to information. As we explore in our discussion, our findings suggest that gateway effects are most likely when increases in censorship are sudden and blunt { when applied during emerging protests or crises, for example.1 By motivating more people to acquire the ability to evade censorship, a sudden increase in censorship can erode its own effectiveness, can politicize previously apolitical citizens, and can accumulate collective action potential that it often seeks to suppress. The paper proceeds as follows. First, we describe the previous literature on the effects of censorship and introduce the logic behind how censorship can increase access to information and politicize previously apolitical users. Second, we describe our research design and the case we use to test our theory { the sudden block of Instagram in China in September 2014. Using our data, we describe the types of users who evade censorship before the sudden block of Instagram. Then, we show how the Instagram block increased access to information for the majority of Instagram users. We end with implications of this research, including a description of the circumstances under which censorship will lead to the gateway effects that we describe. Censorship and Access to Information A large literature has contributed to our knowledge of how censorship influences the political views and behavior of its intended targets. Most of the literature finds that censorship generally decreases access to information among citizens. Scholars have shown that by reducing con- nectivity to information sources, censorship and repression can successfully restrict information and demobilize individuals from engaging in the behavior the government deems objectionable (Enikolopov, Petrova and Zhuravskaya, 2011; Pierskalla and Hollenbach, 2013; Edmond, 2013). Others have found that when media is restricted in authoritarian governments, citizens access what is readily available to them (Stockmann, 2012; Geddes and Zaller, 1989) and do not discuss alternative information with each other because they do not know what others believe (Kuran, 1997). Government control of the media can also provide signals to citizens to follow the gov- 1Censorship might be more sudden and thus less effective when collective action events are decentralized and spontaneous (Steinert-Threlkeld, Forthcoming). 3 ernment line. Huang (2015) finds that propaganda in China can signal government strength and Stern and Hassid (2012) find that the ambiguous nature of off limits information can induce risk-averse journalists to self-censor instead of spreading information. Censorship may even have adverse effects on information outside of a country by reducing incentives for citizens of other countries to engage in social media without a wider audience (Zhang and Zhu, 2011). Perhaps it is no wonder, then, that governments tend
Recommended publications
  • Privacy & Confidence

    Privacy & Confidence

    ESSAYS ON 21ST-CENTURY PR ISSUES PRIVACY AND CONFIDENCE photo: “Anonymous Hollywood Scientology protest” by Jason Scragz http://www.flickr.com/photos/scragz/2340505105/ PAUL SEAMAN Privacy and Confidence Paul Seaman Part I Google’s Eric Schmidt says we should be able to reinvent our identity at will. That’s daft. But he’s got a point. Part II What are we PRs to do with the troublesome issue of privacy? We certainly have an interest in leading this debate. So what kind of resolution should we be advising our clients to seek in this brave new world? Well, perhaps we should be telling them to win public confidence. Part III Blowing the whistle on WikiLeaks - the case against transparency in defence of trust. This essay appeared as three posts on paulseaman.eu between February and August 2010. Privacy and Confidence 3 Paul Seaman screengrab of: http://en.wikipedia.org/wiki/Streisand_effect of: screengrab Musing on PR, privacy and confidence – Part I Google’s Eric Schmidt says we should be recently to the WSJ: able to reinvent our identity at will. That’s daft. But he’s got a point. Most personalities “I actually think most people don’t want possess more than one side. Google to answer their questions,” he elabo- rates. “They want Google to tell them what PRs are well aware of the “Streisand Effect”, they should be doing next. coined by Techdirt’s Mike Masnick1, as the exposure in public of everything you try “Let’s say you’re walking down the street. hardest to keep private, particularly pictures.
  • Information Retrieval System: Concept and Scope MODULE - 5B INFORMATION RETRIEVAL SYSTEM

    Information Retrieval System: Concept and Scope MODULE - 5B INFORMATION RETRIEVAL SYSTEM

    Information Retrieval System: Concept and Scope MODULE - 5B INFORMATION RETRIEVAL SYSTEM 15 Notes INFORMATION RETRIEVAL SYSTEM: CONCEPT AND SCOPE 15.1 INTRODUCTION Information is communicated or received knowledge concerning a particular fact or circumstance. Retrieval refers to searching through stored information to find information relevant to the task at hand. In view of this, information retrieval (IR) deals with the representation, storage, organization of/and access to information items. Here, types of information items include documents, Web pages, online catalogues, structured records, multimedia objects, etc. Chief goals of the IR are indexing text and searching for useful documents in a collection. Libraries were among the first institutions to adopt IR systems for retrieving information. In this lesson, you will be introduced to the importance, definitions and objectives of information retrieval. You will also study in detail the concept of subject approach to information, process of information retrieval, and indexing languages. 15.2 OBJECTIVES After studying this lesson, you will be able to: define information retrieval; understand the importance and need of information retrieval system; explain the concept of subject approach to information; LIBRARY AND INFORMATION SCIENCE 321 MODULE - 5B Information Retrieval System: Concept and Scope INFORMATION RETRIEVAL SYSTEM illustrate the process of information retrieval; and differentiate between natural, free and controlled indexing languages. 15.3 INFORMATION RETRIEVAL (IR) Notes The term ‘information retrieval’ was coined by Calvin Mooers in 1950. It gained popularity in the research community from 1961 onwards, when computers were introduced for information handling. The term information retrieval was then used to mean retrieval of bibliographic information from stored document databases.
  • GLOBAL CENSORSHIP Shifting Modes, Persisting Paradigms

    GLOBAL CENSORSHIP Shifting Modes, Persisting Paradigms

    ACCESS TO KNOWLEDGE RESEARCH GLOBAL CENSORSHIP Shifting Modes, Persisting Paradigms edited by Pranesh Prakash Nagla Rizk Carlos Affonso Souza GLOBAL CENSORSHIP Shifting Modes, Persisting Paradigms edited by Pranesh Pra ash Nag!a Ri" Car!os Affonso So$"a ACCESS %O KNO'LE(GE RESEARCH SERIES COPYRIGHT PAGE © 2015 Information Society Project, Yale Law School; Access to Knowle !e for "e#elo$ment %entre, American Uni#ersity, %airo; an Instituto de Technolo!ia & Socie a e do Rio+ (his wor, is $'-lishe s'-ject to a %reati#e %ommons Attri-'tion./on%ommercial 0%%.1Y./%2 3+0 In. ternational P'-lic Licence+ %o$yri!ht in each cha$ter of this -oo, -elon!s to its res$ecti#e a'thor0s2+ Yo' are enco'ra!e to re$ro 'ce, share, an a a$t this wor,, in whole or in part, incl' in! in the form of creat . in! translations, as lon! as yo' attri-'te the wor, an the a$$ro$riate a'thor0s2, or, if for the whole -oo,, the e itors+ Te4t of the licence is a#aila-le at <https677creati#ecommons+or!7licenses7-y.nc73+07le!alco e8+ 9or $ermission to $'-lish commercial #ersions of s'ch cha$ter on a stan .alone -asis, $lease contact the a'thor, or the Information Society Project at Yale Law School for assistance in contactin! the a'thor+ 9ront co#er ima!e6 :"oc'ments sei;e from the U+S+ <m-assy in (ehran=, a $'-lic omain wor, create by em$loyees of the Central Intelli!ence A!ency / em-assy of the &nite States of America in Tehran, de$ict.
  • Introduction to Information Retrieval

    Introduction to Information Retrieval

    DRAFT! © April 1, 2009 Cambridge University Press. Feedback welcome. 1 1 Boolean retrieval The meaning of the term information retrieval can be very broad. Just getting a credit card out of your wallet so that you can type in the card number is a form of information retrieval. However, as an academic field of study, INFORMATION information retrieval might be defined thus: RETRIEVAL Information retrieval (IR) is finding material (usually documents) of an unstructured nature (usually text) that satisfies an information need from within large collections (usually stored on computers). As defined in this way, information retrieval used to be an activity that only a few people engaged in: reference librarians, paralegals, and similar pro- fessional searchers. Now the world has changed, and hundreds of millions of people engage in information retrieval every day when they use a web search engine or search their email.1 Information retrieval is fast becoming the dominant form of information access, overtaking traditional database- style searching (the sort that is going on when a clerk says to you: “I’m sorry, I can only look up your order if you can give me your Order ID”). IR can also cover other kinds of data and information problems beyond that specified in the core definition above. The term “unstructured data” refers to data which does not have clear, semantically overt, easy-for-a-computer structure. It is the opposite of structured data, the canonical example of which is a relational database, of the sort companies usually use to main- tain product inventories and personnel records.
  • Guadamuz2013.Pdf (5.419Mb)

    Guadamuz2013.Pdf (5.419Mb)

    This thesis has been submitted in fulfilment of the requirements for a postgraduate degree (e.g. PhD, MPhil, DClinPsychol) at the University of Edinburgh. Please note the following terms and conditions of use: • This work is protected by copyright and other intellectual property rights, which are retained by the thesis author, unless otherwise stated. • A copy can be downloaded for personal non-commercial research or study, without prior permission or charge. • This thesis cannot be reproduced or quoted extensively from without first obtaining permission in writing from the author. • The content must not be changed in any way or sold commercially in any format or medium without the formal permission of the author. • When referring to this work, full bibliographic details including the author, title, awarding institution and date of the thesis must be given. Networks, Complexity and Internet Regulation Scale-Free Law Andres Guadamuz Submitted in accordance with the requirements for the degree of Doctor of Philosophy by Publication(PhD) The University of Edinburgh February 2013 The candidate confirms that the work submitted is his/her own and that appropriate credit has been given where reference has been made to the work of others. © Andrés Guadamuz 2013 Some rights reserved. This work is Licensed under a Creative Commons Attribution-NonCommercial- ShareAlike 3.0 Unported License. Contents Figures and Tables ix Figures ix Tables x Abbreviations xi Cases xv Acknowledgments xvii License xix Attribution-NonCommercial-NoDerivs 3.0 Unported xix 1. Introduction 1 A short history of psychohistory 3 Objectives 10 Some notes on methodology 13 2. The Science of Complex Networks 15 1.
  • My Name Is Julian Sanchez, and I

    My Name Is Julian Sanchez, and I

    September 24, 2020 The Honorable Jan Schakowsky The Honorable Cathy McMorris Rodgers Chairwoman Ranking Member Subcommittee on Consumer Subcommittee on Consumer Protection & Commerce Protection & Commerce Committee on Energy & Commerce Committee on Energy & Commerce U.S. House of Representatives U.S. House of Representatives Washington, DC 20515 Washington, DC 20515 Dear Chairwoman Schakowsky, Ranking Member McMorris Rodgers, and Members of the Subcommittee: My name is Julian Sanchez, and I’m a senior fellow at the Cato Institute who focuses on issues at the intersection of technology and civil liberties—above all, privacy and freedom of expression. I’m grateful to the committee for the opportunity to share my views on this important topic. New communications technologies—especially when they enable horizontal connections between individuals—are inherently disruptive. In 16th century Europe, the advent of movable type printing fragmented a once-unified Christendom into a dizzying array of varied—and often violently opposed—sects. In the 1980s, one popular revolution against authoritarian rule in the Philippines was spurred on by broadcast radio—and decades later, another was enabled by mobile phones and text messaging. Whenever a technology reduces the friction of transmitting ideas or connecting people to each other, the predictable result is that some previously marginal ideas, identities, and groups will be empowered. While this is typically a good thing on net, the effect works just as well for ideas and groups that had previously been marginal for excellent reasons. Periods of transition from lower to higher connectivity are particularly fraught. Urbanization and trade in Europe’s early modern period brought with them, among their myriad benefits, cyclical outbreaks of plague, as pathogens that might once have burned out harmlessly found conditions amenable to rapid spread and mutation.
  • PLAYNOTES Season: 43 Issue: 05

    PLAYNOTES Season: 43 Issue: 05

    PLAYNOTES SEASON: 43 ISSUE: 05 BACKGROUND INFORMATION PORTLANDSTAGE The Theater of Maine INTERVIEWS & COMMENTARY AUTHOR BIOGRAPHY Discussion Series The Artistic Perspective, hosted by Artistic Director Anita Stewart, is an opportunity for audience members to delve deeper into the themes of the show through conversation with special guests. A different scholar, visiting artist, playwright, or other expert will join the discussion each time. The Artistic Perspective discussions are held after the first Sunday matinee performance. Page to Stage discussions are presented in partnership with the Portland Public Library. These discussions, led by Portland Stage artistic staff, actors, directors, and designers answer questions, share stories and explore the challenges of bringing a particular play to the stage. Page to Stage occurs at noon on the Tuesday after a show opens at the Portland Public Library’s Main Branch. Feel free to bring your lunch! Curtain Call discussions offer a rare opportunity for audience members to talk about the production with the performers. Through this forum, the audience and cast explore topics that range from the process of rehearsing and producing the text to character development to issues raised by the work Curtain Call discussions are held after the second Sunday matinee performance. All discussions are free and open to the public. Show attendance is not required. To subscribe to a discussion series performance, please call the Box Office at 207.774.0465. By Johnathan Tollins Portland Stage Company Educational Programs are generously supported through the annual donations of hundreds of individuals and businesses, as well as special funding from: The Davis Family Foundation Funded in part by a grant from our Educational Partner, the Maine Arts Commission, an independent state agency supported by the National Endowment for the Arts.
  • Knowledge Democracy and the Implications to Information Access

    Knowledge Democracy and the Implications to Information Access

    The current issue and full text archive of this journal is available at www.emeraldinsight.com/1750-497X.htm Knowledge Knowledge democracy and the democracy implications to information access Ahmad Raza and Hasan Sohaib Murad School of Business and Economics, University of Management and Technology, 37 Lahore, Pakistan Abstract Purpose – The purpose of this paper is to examine the concept of “knowledge democracy,” deploying a pluralistic, and cross disciplinary and humanistic critique. Design/methodology/approach – This is a culturally pluralistic and humanistic interpretation of globally emergent form of learning pedagogy, particularly manifested in e-learning. Findings – This paper explores the concept of knowledge democracy in the context of knowledge and information revolution. It has been argued that knowledge democratization implies freedom and equality to access information and knowledge across cultures and societies, particularly in the context of globalization. It is asserted that a democratization of the notion of knowledge would cause a paradigm shift; the way instruction and education are socially structured in different social systems. The knowledge society provides a new spirit of global sharing of values, acceptance of others and learning to live with divergent worldviews. It is contended that e-learning in particular sets a new global social opportunity to transcend regional, racial and national prejudices. Originality/value – The paper underscores the significance of pluralistic and humanistic perspective on knowledge and e-learning. Keywords Globalization, Epistemology, E-learning, Knowledge management, Information and communication technologies Paper type Conceptual paper Social forms of knowledge Historically, knowledge has been the defining attribute of human species. From the simple hunters of pre-historic times to medieval peasants to modern day information creators; all have sought to understand more deeply the structure of physical and social world.
  • Ethical Hacking

    Ethical Hacking

    Ethical Hacking Alana Maurushat University of Ottawa Press ETHICAL HACKING ETHICAL HACKING Alana Maurushat University of Ottawa Press 2019 The University of Ottawa Press (UOP) is proud to be the oldest of the francophone university presses in Canada and the only bilingual university publisher in North America. Since 1936, UOP has been “enriching intellectual and cultural discourse” by producing peer-reviewed and award-winning books in the humanities and social sciences, in French or in English. Library and Archives Canada Cataloguing in Publication Title: Ethical hacking / Alana Maurushat. Names: Maurushat, Alana, author. Description: Includes bibliographical references. Identifiers: Canadiana (print) 20190087447 | Canadiana (ebook) 2019008748X | ISBN 9780776627915 (softcover) | ISBN 9780776627922 (PDF) | ISBN 9780776627939 (EPUB) | ISBN 9780776627946 (Kindle) Subjects: LCSH: Hacking—Moral and ethical aspects—Case studies. | LCGFT: Case studies. Classification: LCC HV6773 .M38 2019 | DDC 364.16/8—dc23 Legal Deposit: First Quarter 2019 Library and Archives Canada © Alana Maurushat, 2019, under Creative Commons License Attribution— NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0) https://creativecommons.org/licenses/by-nc-sa/4.0/ Printed and bound in Canada by Gauvin Press Copy editing Robbie McCaw Proofreading Robert Ferguson Typesetting CS Cover design Édiscript enr. and Elizabeth Schwaiger Cover image Fragmented Memory by Phillip David Stearns, n.d., Personal Data, Software, Jacquard Woven Cotton. Image © Phillip David Stearns, reproduced with kind permission from the artist. The University of Ottawa Press gratefully acknowledges the support extended to its publishing list by Canadian Heritage through the Canada Book Fund, by the Canada Council for the Arts, by the Ontario Arts Council, by the Federation for the Humanities and Social Sciences through the Awards to Scholarly Publications Program, and by the University of Ottawa.
  • Bibliometric Analysis of the Scientific Production of the Information Architecture Related to Libraries

    Bibliometric Analysis of the Scientific Production of the Information Architecture Related to Libraries

    Bibliometric Analysis of the Scientific Production of the Information Architecture Related to Libraries Vitor Taga Danielly Oliveira Inomata Caroline Rodrigues Vaz Mauricio Uriona Maldonado Gregório Varvakis Universidade Federal de Santa Catarina - UFSC, Brasil ARTICLE Abstract Objective. Information architecture is a determinant guiding element for content layout and user navigation. This work aims at identifying and characterizing the scientific production about information architecture related to libraries. Method. In order to achieve the objective, a bibliometric review and a systemic analysis were conducted, the first to identify the most cited articles, the most productive authors in the field, the main journals; and the latter to characterize the debate and results presented in the articles. For the structured literature review, the Proknow-C method was utilized. The search was made in the Web of Science, Scopus and Science Direct databases. Results. One hundred fifteen articles were identified. Three peaks in the number of publications in 2001 (5), 2002 (6) and 2006 (4) were identified. Conclusions. The publications were concentrated in the Social Sciences and Computer Science. The main keywords (Digital libraries, Information architecture and World Wide Web) already contextualize and represent the content of the recovered articles. In relation to content analysis of the articles, a possible convergence in papers aimed towards studies of information architecture and digital libraries is discussed, which is very coherent with the current literature. We point out information architecture makes digital information environments better labelled and facilitates information access. Keywords Bibliometrics; Information architecture; Libraries Análise bibliométrica da produção científica de Arquitetura da Informação relacionados às bibliotecas Resumo Objetivo.
  • The Impact of Media Censorship: Evidence from a Field Experiment in China

    The Impact of Media Censorship: Evidence from a Field Experiment in China

    The Impact of Media Censorship: Evidence from a Field Experiment in China Yuyu Chen David Y. Yang* January 4, 2018 — JOB MARKET PAPER — — CLICK HERE FOR LATEST VERSION — Abstract Media censorship is a hallmark of authoritarian regimes. We conduct a field experiment in China to measure the effects of providing citizens with access to an uncensored Internet. We track subjects’ me- dia consumption, beliefs regarding the media, economic beliefs, political attitudes, and behaviors over 18 months. We find four main results: (i) free access alone does not induce subjects to acquire politically sen- sitive information; (ii) temporary encouragement leads to a persistent increase in acquisition, indicating that demand is not permanently low; (iii) acquisition brings broad, substantial, and persistent changes to knowledge, beliefs, attitudes, and intended behaviors; and (iv) social transmission of information is statis- tically significant but small in magnitude. We calibrate a simple model to show that the combination of low demand for uncensored information and the moderate social transmission means China’s censorship apparatus may remain robust to a large number of citizens receiving access to an uncensored Internet. Keywords: censorship, information, media, belief JEL classification: D80, D83, L86, P26 *Chen: Guanghua School of Management, Peking University. Email: [email protected]. Yang: Department of Economics, Stanford University. Email: [email protected]. Yang is deeply grateful to Ran Abramitzky, Matthew Gentzkow, and Muriel Niederle
  • Youtube Recommendations and Effects on Sharing Across Online Social Platforms

    Youtube Recommendations and Effects on Sharing Across Online Social Platforms

    YouTube Recommendations and Effects on Sharing Across Online Social Platforms CODY BUNTAIN, New Jersey Institute of Technology, USA RICHARD BONNEAU, Center for Social Media and Politics, New York University, USA JONATHAN NAGLER, Center for Social Media and Politics, New York University, USA JOSHUA A. TUCKER, Center for Social Media and Politics, New York University, USA In January 2019, YouTube announced its platform would exclude potentially harmful content from video recommendations while allowing such videos to remain on the platform. While this action is intended to reduce YouTube’s role in propagating such content, continued availability of these videos via hyperlinks in other online spaces leaves an open question of whether such actions actually impact sharing of these videos in the broader information space. This question is particularly important as other online platforms deploy similar suppressive actions that stop short of deletion despite limited understanding of such actions’ impacts. To assess this impact, we apply interrupted time series models to measure whether sharing of potentially harmful YouTube videos in Twitter and Reddit changed significantly in the eight months around YouTube’s announcement. We evaluate video sharing across three curated sets of anti-social content: a set of conspiracy videos that have been shown to experience reduced recommendations in YouTube, a larger set of videos posted by conspiracy-oriented channels, and a set of videos posted by alternative influence network (AIN) channels. As a control, we also evaluate these effects on a dataset of videos from mainstream news channels. Results show conspiracy-labeled and AIN videos that have evidence of YouTube’s de-recommendation do experience a significant decreasing trend in sharing on both Twitter and Reddit.